Saturday, July 5, 2008

Zemskov.net

free email and free web hosting internet services reviews

Sunday, June 29, 2008

Nearly Half of IT Workers Snoop in Confidential Files

Nearly half of IT workers have admitted to snooping around networks to look at confidential information, according to research from software firm Cyber-Ark. "When it comes down to it, IT has essentially enabled snooping to happen. It's easy -- all you need is access to the right passwords or privileged accounts and you're privy to everything that'

read more

Ransomware Encrypts Victim Files With 1024-Bit Key

A dangerous new strain of malicious software that holds the victim's computers files for ransom has been unleashed, and researchers have yet to crack the encryption key.

read more

Hackers Crack London Tube's Ticketing System

Dutch security researchers rode the London Underground free for a day after easily using an ordinary laptop to clone the "smartcards" commuters use to pay fares, a hack that highlights a serious security flaw because similar cards provide access to thousands of government offices, hospitals and schools.

read more

Monday, May 19, 2008

Deep packet inspection under assault over privacy concerns

A Canadian law clinic has asked the country's Privacy Commissioner to take a closer look at the deep packet inspection being used by Bell Canada and others. While the technology also raises net neutrality concerns, in this case the issue is privacy.

read more

Security Flaw Turns Gmail into Open-Relay Server

A newfound flaw in Google's Gmail allows would-be spammers to treat the service as an open-relay server. Compounding the issue is the fact that services such as Hotmail and Yahoo "trust" Gmail. This may facilitate e-mail delivery, but it also makes it easier for spammers to reach their intended targets.

read more

The Internet as a Walled Garden?

Now it seems the only question is whether the government will be able to turn the net into a controllable, monitorable and trackable pre-internet AOL-type service or whether the chaotic net will live on as just another frontier for the military-industrial complex to start an arm's race and rake in billions of government dollars.

read more

Friday, February 29, 2008

Can you hear me now? Yes, yes I can. (GSM hacked for cheap)

The 64-bit encryption method used by GSM networks (AT&T/TMobile/etc), known as A5/1 has been theoretically crackable for 10 years now, but it was very expensive to do so. At Black Hat D.C. 2008 however, a $1,000 solution was unveiled that claims to crack it in 30 minutes, or for $100,000 it can be cracked in 30 seconds.

read more

Make Sure You Know When Someone Hacks Your Email

If someone has cracked your email password, it may not be apparent to you. A snooper can easily read an email then mark it as unread again. So the best thing to do would be to set up an “electronic tripwire” so if someone breaks into your account, you’ll know about it.

read more

How Internet Censorship Works

One of the early nicknames for the Internet was the "information superhighway" because it was supposed to provide the average person with fast access to a practically limitless amount of data. For many users, that's exactly what accessing the Internet is like. For others, it's as if the information superhighway has some major roadblocks in the form

read more

Is it time to consider PDF a threat?

The 8.12 patch for Adobe Reader that Adobe released last week fixed a number of security holes—but not before malware capable of exploiting them had been on the market for weeks. The end result is tough questions on whether it is time to consider PDF a security threat.

read more

Confessions of a Caller-ID spoofer

He spoofed the HR director's work phone number, then the number of that guy's boss, before moving up to a vice president, and finally, the CEO. Says he had no choice. He also says "this thing that I did is bad and should be outlawed." He even spoofed a White House number. Fascinating full interview.

read more

Huge Leak: Database of 8,700+ stolen cooperate FTP accounts

The stolen credentials belong to companies from around the world and include more than 2500 North American companies, some of which are the world's top 100 domains, according to security company Finjan. The ISP hosting the db has been notified but they still have not removed it. Finjan says companies can email them to check if their info was stolen

read more

Wednesday, January 23, 2008

Microsoft To Acquire Enterprise Anti-Virus Security Provider Sybari Softwar

Microsoft Corp. today announced that it has signed definitive agreements to acquire Sybari Software Inc., a leading provider of security products that help more than 10,000 businesses worldwide protect their messaging and collaboration servers from viruses, worms and spam.

read more

IT industry's 12-point security plan

The Cyber Security Industry Alliance (CSIA), a consultative body of computer security professionals, yesterday published a 12-point list for securing America's IT infrastructure.

read more

Facebook Voter Registration App Asks for SSN w/o SSL

Encouraging young people to vote is a great idea, but asking for social security numbers with no encryption or security whatsoever is downright retardulous.

read more

MediaDefender Hacker Speaks Out

In September 2007, anti-piracy company MediaDefender's emails went public after a hacker gained access to their systems. The attacks cost the company a huge amount of money, not to mention acute embarrassment. Now the person behind the attacks speaks.

read more

Thursday, January 17, 2008

Hackers Run Wild Spending BitTorrent Tracker’s Donations

The SuperTorrents BitTorrent tracker has been the subject of a major security breach, with hackers donating all the site's money to a religious group. The hackers even went as far as contacting the site's host and canceled all of their seedboxes.

read more

Big Brother Is Listening ... And Listening ... And Listening

"The NSA intercepts entire streams of electronic communications containing millions of telephone calls and e-mails. It runs the intercepts through very powerful computers that screen them for particular names, telephone numbers, Internet addresses, and trigger words or phrases. Any communications containing flagged information" are analyzed.

read more

Microsofts' spy patent can monitor even your heartbeat

Every aspect of computer users’ lives — from their heartbeat to a guilty smile — could be monitored and immediately analysed under the futuristic system detailed in Microsoft’s patent application. The systems work not only through desktop or laptop computers but even through mobile phones or handheld PCs

read more

The Pirates Can't Be Stopped

Ethan and I had first started talking over an untraceable prepaid phone...He eventually agrees to speak in person...He hands me a flash drive containing documents...He also pulls out a...sheet of paper bearing my name, the first five digits of my Social Security number, a few pictures...and addresses going back 10 years. "I had to check," he said.

read more

National Do Not Call Registry

The National Do Not Call Registry gives you a choice about whether to receive telemarketing calls at home. Most telemarketers should not call your number once it has been on the registry for 31 days. If they do, you can file a complaint at this Website. You can register your home or mobile phone for free.

read more

FBI Wiretaps Canceled for Non-Payment

Telephone companies have cut off FBI wiretaps used to eavesdrop on suspected criminals because of the bureau's repeated failures to pay their phone bills on time.

read more

2504 Steps to Closing Your Facebook Account

Yes, it's true! I finally managed to close my Facebook account. It was a long, arduous road - the hardest part was slaying the Gorgon on level 16 - and I'm glad it's finally over.

read more

Boeing's New 787 May Be Vulnerable to Hacker Attack

Boeing's new 787 Dreamliner passenger jet may have a serious security vulnerability in its onboard computer networks that could allow passengers to access the plane's control systems,The computer network in the Dreamliner's passenger compartment, designed to give passengers in-flight internet access, is connected to everything the plane controls.

read more

Questions to Consider in the Coming Privacy Wars

It seems obvious that privacy is going to be a major point of contention in the near-term future. It's only going to get hotter as major online services compile huge amounts of data about us. There are a lot of "little questions" that we need to engage with as soon as possible. Here's my list of important questions, what's on yours?

read more

Sears: Come see the softer side of spyware

When you join an online "community," are you joining so that you can interact with like-minded users, or so that companies can track your every move on the Internet? Sears is banking on the latter, despite heavy criticism from security researchers.

read more